Acceptable Use Policy
Overview
This policy is intended to protect the University’s faculty, employees, Students and employees as well as the University from the consequences of illegal or damaging actions by individuals using the University Information Technology Network.
The University Information Technology Network includes: Internet/Intranet/Extranetrelated systems, including but not limited to computer/Networking equipment, Software,
Operating Systems, storage media, Network accounts providing electronic mail, Instant
Messaging, student information system, WWW browsing, and FTP, which are the property of the University. They are to be used for University business purposes and to serve the interests of the University, and as well as all Authorized Users. Effective computer Security is a team effort requiring the participation and support of every University faculty member, employee, student and Authorized User who deals with information and/or information systems. It is the responsibility of every computer user to know the University Information
Technology Policies and Procedures, and to comply with the University Information
Technology Policies and Procedures.
Purpose
This policy describes the Authorized Use of the University Information Technology Network and protects the University and Authorized Users. Unauthorized uses expose the University to many risks including legal liability, Virus attacks, and the compromise of Network systems, Services, and information.
Scope
This policy applies to all persons with a Park University-owned, third party-owned, or personally-owned computing device that is connected to the University Information
Technology Network.
Policy
General Use and Ownership
§
Data created by Authorized Users that is on the University Information Technology
Network is the property of the University. There is no guarantee that information stored on the University Information Technology Network